We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Fix NULL pointer dereference when nosmp is used With nosmp in cmdline, other CPUs are not brought up, leaving their cpc_desc_ptr NULL. CPU0's iteration via for_each_possible_cpu() dereferences these NULL pointers, causing panic. Panic backtrace: [ 0.401123] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000b8 ... [ 0.403255] [<ffffffff809a5818>] cppc_allow_fast_switch+0x6a/0xd4 ... Kernel panic - not syncing: Attempted to kill init! [ rjw: New subject ]
Reserved 2025-04-16 | Published 2025-07-03 | Updated 2025-07-03 | Assigner Linuxgit.kernel.org/...c/356d09c7f5bf525086002a34f8bae40b134d1611
git.kernel.org/...c/c6dad167aade4bf0bef9130f2f149f4249fc4ad0
git.kernel.org/...c/32a48db4cf28ea087214c261da8476db218d08bd
git.kernel.org/...c/1a677d0ceb4a5d62117b711a8b2e0aee80d33015
git.kernel.org/...c/15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12
Support options